Processing Enterprise Architect Models with the YAKINDU EA-Bridge

Previously, I presented how to tailor Enterprise Architect (EA) with MDG Technologies to define UML profiles and with add-ins to increase productivity. In this final article, I would like to develop the running example further to generate source code from the EA model. This means to transform the EA model into an Ecore model, the meta model of EMF. Read more >

Using Eclipse Mita with YAKINDU Statechart Tools

Using YAKINDU Statechart Tools is an effective way to describe reactive, event-driven systems. As part of my master thesis I took YAKINDU Statechart Tools and implemented a custom code generator for the new programming language Eclipse Mita. In this blog post I want to show you how it works and how you can use it in your development. Read more >

How to Integrate Arduino with Eclipse Mita

Developing embedded devices, especially for IoT applications, can be a very complex task and requires a lot of knowledge. In the last blog post of my colleague Thomas Kutz we introduced Eclipse Mita, a new programming language designed for developing embedded IoT devices. It comes with a concise syntax based on event-driven paradigms and abstracts from the underlying hardware.  Read more >

Eclipse Mita – Bringing software development for the IoT to a higher level

Software development for embedded IoT systems is not an easy task. In most cases, you’ll have to write C or C++ code; both coming with a higher learning curve than modern programming languages like Go and Rust. And in most cases, you’ll have to write a fair amount of lines of code to make an LED blink, the Hello World application of embedded software development. However, especially when you come from an application development point of view, the real difficulty lies in dealing with the hardware you are developing for. Read more >

Tailoring Enterprise Architect with Add-ins

This is the second of three articles in which I would like to discuss common issues (and our solutions) that occur when Enterprise Architect, EA for short, is used to create models that are processed further by other tools.  Read more >

Tailoring Enterprise Architect with MDG Technologies

Enterprise Architect, EA for short, is a widely used integrated modeling platform with an impressive amount of supported languages including UML, SysML or BPMN. But even with this large collection of languages, you may have found yourself in a situation where none of them fulfilled your particular use case in an appropriate manner. Such situations occur often when the EA model is processed further by other tools and is not only used for documentation purposes. The challenge is then to come up with a model that is accepted by the tools processing it. Read more >

Managing unrealistic expectations in embedded software development

According to a number of different studies  somewhere between 30 % and 70 % of embedded software projects are unsuccessful. Success can, of course, be measured in a number of different ways, which is probably where the large range in the statistics comes from. However, no business really wants even the lowest measurement, 30 %, of its projects to be unsuccessful. Read more >

YAKINDU Statechart Tools March release – new and noteworthy

We released YAKINDU Statechart Tools Standard and Professional Edition version 3.3.0 today!  In the last three months, our team closed 126 issues in total. Here are the new and noteworthy changes in the new version: Read more >

Traceability – A generic way to link requirements and test cases

Do you want to establish (requirements) traceability to your custom scripts, text files and tools, e.g. link requirements residing in DOORS or Polarion to test cases defined in tools such as VectorCAST or maybe to a custom scripting language? In this post I want to illustrate how to achieve not only the linking in such a case, but also how easy it is to navigate such links and to create a coverage report based on those links. Read more >

A Tool-Based Security Analysis – Part 2: Damage Classes And Potentials

In Part 1 of this blog series, we have seen how the attack potential of an attacking agent can be modeled. For our system, we also want to model the parts and aspects that we want to protect and the damage that can be done by an attacker.  So as a next step, we will model damage classes and damage potential. Read more >


Popular posts